2 minute read

puter viruses more than 2 aspirins

Next Article
D\ro

D\ro

Distributors:

NORTHEAST

Coastal Specialty Forest Products

Hookset, N.H.

N.H. only 800-424-4036

N.E. other 800-932-9663

Hudson Building Supply Company

Ashley, Pa.i 71 7-829-57 31

SOUTHEAST

Epperson Lumber Sales

Statesville. N C. | 7 O+87 3-4321

Wholesale Wood Ploducts

Dothan, Al. / 205-793-6028

LAKE STATES

Badger Wholesale Lumber, Inc.

Cottage Grove, Wi. /608-839-4565

Chicago Suburban Lumber Sales

Forest Park, ll. I 31 2-7 7 1-8181

Hager Distribution

Grand Rapids, Mi. | 616-247 -79U

Hudson Building Supply Company

Elkhart, In./21 9-262-3666

North Santiam Lumber Co. of Ohio

Columbus, Oh. | 61 4-27 2-8111

MIDWEST

Canton Redwood Sales

M innea polis, Mn. | 61 2-425-1 4OO

Weekes Forest Products, Inc.

Minneapolis, Mn./61 2-721-8585

Mn. Watts 800-352-2766

Regional Watts 80G328-2890

MOUNTAIN

Click & Geddes Lumber Company

Denver, Co. /303-534-01 95

Kaibab lndustries

Englewood, Co. /303-761-9882

Reid & Wright Lumber

Broomf ield, Co. /303-460-9663 salt Lake city, Ut./801-972-5525

Weyerhaeuser Co.

SOUTHWEST

Capital Lumber Company

Phoenix, Az. 602-269-6225

Peralta, N.M. 505-877 -7 222

Lubbock, Tx. 806-747-3191

LeeRoy Jordan Lumber Company

Dallas, Tx. 21 4-357 -7 311

Ausrin, Tx. 51 2-385-5334

Slaughter Bros.

Dallas, Tx. / 21 4-341-9000

Memohis. Tn./901-365-6500 ers, in?

HOW SECURE is a home center computer system against hackviruses, vandalism and break- r All software should be purchased from known, reputable sources. o All purchased software should be in its original shrink wrap or sealed diskette containers when received. o Backup copies of all original software should be made as soon as the software package is opened. Backup copies should be stored offsite. o Once purchased, all software should be reviewed carefully by a system manager before it is installed on a distributed system, or computer network. o New software should be quarantined on an isolated computer. This testing will reduce greatly the risk of virus contamination. r A backup copy of all system software and data should be made at least once a month, with the backup copy stored for at least one year before reuse. This will allow restoration of a system that has been contaminated by a "time-released" virus. o All programs on a system should be checked regularly for changes in program length. Any size deviations could be evidence of tampering or virus infiltration. o Many "shareware" or "freeware" programs are invaluable. However, these programs are the prime entry point for system viruses. Skeptical review of such programs is prudent. o Any software that exhibits symptoms of possible virus contamination should be removed from general use immediately. System managers should develop plans for quick removal from service of all copies of a suspect program and immediate backup of all related data.

As virus epidemics, illegal transactions and hacker sabotage make the headlines, home center managers worry about special security practices they should be following. The following recommendations from the National LAN Laboratory in Reston, Va., aim at avoiding infection. Following them will help to prevent and control virus contamination.

. System administrators should restrict access to programs and data. This isolates problems, protects critical applications and facilitates the diagnosis of problems.

Additional security measures recommeded in the industry include careful control of passwords including terminating passwords promptly when an employee leaves the company. Experts suggest avoiding common passwords such as names. Some companies develop two level codes using symbols, numbers and letters on the keyboard to construct a password.

Turning off the modem when data is not being received can prevent access by unauthorized persons. Although it involves manual input, there are companies downloading outside data onto personal computers and rekeying it into the mainframe. Keeping backups of all information in a safe location can prevent loss in a fire or disaster.

Story at a Glance

Ways to keep your computer system healthy. precautions to cut contamination. . security practices that work.

This article is from: